Report Descriptions

Report Descriptions

Wavecrest products provide several reports to clearly depict the Web activity of a work group or an individual user. To furnish additional value, most reports contain multiple sub-reports or tables that cover different aspects of the activity.

Content Flexibility.  While our reports can be very comprehensive, they also can be easily configured to restrict the information displayed. Restrictable parameters include: (a) categories displayed, (b) number of users displayed, (c) time frame covered, and (d) groups or users to be covered. With this flexibility, recipients can get only the information they want and need.

Descriptions of All Reports.  Each report is described briefly below.


High-Level Summary Reports

Category Audit Summary Report

Features.  This report provides a synopsis of users' Web activity in a single category that you select. It lists all visited Web sites (domains), and the time online, bytes read, and number of visits for each, but does not list individual users. A hyperlink to each domain is provided.

Benefits.  This report is very useful for a quick-look determination of whether or not Web-access abuse is taking place in a particular category, e.g., Pornography.


Cloud Services Summary Report

Features.  This report shows the Web activity of users accessing cloud services. By user, it indicates the time online and number of visits to sites in the Audio Streaming, Cloud Infrastructure, Cloud Storage, Collaboration, CRM, Development, File Sharing, HR, Personal E-Mail, Video Streaming, and VoIP Services categories. Information is presented by category, group, and user. A hyperlink to each user is provided to allow management to further review the sites that were visited.

Benefits.  This report can be used to identify cloud service usage patterns to enable new cloud services, better manage cloud subscriptions, and highlight anomalous activity. It can be used to reduce the risk posed by both approved and unapproved cloud services, enabling the safe and cost-effective implementation of cloud services.


Denied Requests Report

Features.  By category, this report shows which users were denied access to Web sites or a page on a Web site. Individual users are identified, but specific URLs are not. Each denied request is displayed in the category requested. Denied requests for a Web page can signify the user may not be authorized to receive the page, the page may not have been found by the Web server, or the page may have been blocked for access.

Benefits.  If you have Web filtering enabled, this report can verify that it is working. It can also be used to identify users who may be engaging in excessive attempts to visit inappropriate or unauthorized sites. This report is also a useful supplementary tool for individual user audits.


Legal Liability Report

Features.  This report shows Web activity that could lead to legal liability. By user, it indicates the time online and number of visits to sites in the Anonymous/Public Proxy, Cults/Occults, Fantasy Sports, Gambling, Hate/Crime, Illegal Drugs, Malware, and Pornography categories. Information is presented by category, group, user, and user within the category. Individual sites are not separately identified.

Benefits.  This tightly focused report facilitates analyses, investigations, and audits related to actual or potential legal liability issues. Results can be used to prompt further investigation or trigger immediate corrective action.


Site Analysis Report

Features.  This report depicts Web site visits by user, group, or Enterprise from the following different perspectives. Time online percentage and time online are also provided.

  • Total visits by classification (Acceptable, Unacceptable, Neutral)
  • Total visits by category (Shopping, Pornography, etc.)
  • Total visits by group
  • Total visits by user
  • Total visits by user, per category

    NOTE:  Individual sites are not identified in this report.

Benefits.  The Site Analysis report looks at the same visits from different perspectives, such as acceptability, category volume, and user visits within categories. It can be used by all levels of management and by network administrators to perform audits and analyses of activity in either broad or focused areas.


Site Audit Summary Report

Features.  This report lists the top groups and users who visited a particular site. The report can be run for more than one site and shows the total time online and number of visits made by the user, as well as the time online percentage and total visits by hourly activity. A hyperlink to each user is provided to allow management to further review the sites that were visited.

Benefits.  This report can be used by administrators to get a quick, summarized look at Internet activity by Web site. It lists the users with the highest volume of activity.


Time Online Analysis Report

Features.  The report shows the amount of time spent accessing Web sites by user, group, or Enterprise from the following different perspectives. The total number of visits is also provided.

  • Total time online by classification (Acceptable, Unacceptable, Neutral)
  • Total time online by category (Video Streaming, Sports, etc.)
  • Total time online by group
  • Total time online by user
  • Total time online by user, per category
  • Time online by hour

    NOTE:  Individual sites are not identified in this report.

Benefits.  The report highlights the top users who spent the most time online during the reporting period and can prompt further investigation. Managers and IT administrators can quickly see which categories had the most volume of activity and address any potential issues, such as productivity loss, bandwidth slowdowns, and policy noncompliance.


Top Users Report

Features.  This report lists the most active users in terms of time online, visits, denied hits, hits, and bytes read.

Benefits.  This report can be used by administrators to get a quick, summarized look at Internet activity on the network. It lists the users with the highest volume of activity, be it acceptable or otherwise. This report is an excellent screening tool and can be used to prompt drilldown and further investigation.


Top Web Sites Report

Features.  This report shows all visited Web sites (domains), and the category, time online, bytes read, and number of visits for each. The list is sorted in descending order by time online which enables quick determination of site "popularity." Individual user IDs are not shown on this report, but hyperlinks to all visited Web sites are provided to facilitate further analysis.

Benefits.  This report highlights the Web sites that were most visited during the reporting period. If these visits are inappropriate, you can use this information to prompt deeper investigation. You may also consider including the offending sites in your blocking regimen if you have one of our Web security products.


Unacceptable Visits Report

Features.  The report depicts Web-use activity only within categories classified as "Unacceptable." By category, it shows the total time online and number of visits made by individual users. Users are identified, but individual sites are not. The report also summarizes unacceptable visits by top categories, groups, users, and hourly activity.

Benefits.  Managers and administrators can quickly evaluate and see patterns of unacceptable activity by user and category. The latter can be done by individual category or at a higher level by a consolidation of all unacceptable categories. If excessive unacceptable activity is indicated, the reviewer can quickly drill down to other reports for further detail.


User Audit Summary Report

Features.  This report lists all the Web sites visited by a single user during the reporting period. For each listed site, the report indicates the category, time online, bytes read, and number of visits made to it. A hyperlink to each site is provided to facilitate further review by management.

Benefits.  Management is provided with reliable information to use in analyzing, evaluating, or investigating an individual user's Web activity.


Audit Detail Reports

Category Audit Detail Report

Features.  This report provides a detailed analysis of users' Web activity in a particular category that you select, e.g., Pornography. All URLs are listed for each user who visited that category. The report also provides the time online percentage, total visits, and total time online for the top groups, users, and hourly activity in this category.

Benefits.  This report is very useful for identifying the most active users and the most heavily visited sites and pages in a selected category. This makes it an excellent tool for conducting detailed audits and investigations of possible misuse of Web-access resources.


Cloud Services Detail Report

Features.  This report shows the specific URLs of cloud services by user, that is, visits to only the Audio Streaming, Cloud Infrastructure, Cloud Storage, Collaboration, CRM, Development, File Sharing, HR, Personal E-Mail, Video Streaming, and VoIP Services categories.

Benefits.  Management has a complete and concise view of every cloud service URL the user has clicked. This information can be used for cloud usage audits, identifying the most active users and the most heavily visited sites.


Denied Requests Report

Features.  This report shows the specific URLs to which users were denied access by user. Each request is displayed in the category requested. Denied requests for a Web page can signify the user may not be authorized to receive the page, the page may not have been found by the Web server, or the page may have been blocked for access.

Benefits.  If you have Web filtering enabled, this report can verify that it is working. It also indicates the number and type of blocked requests, i.e., Denied, and is a very useful supplementary tool for individual user audits.


Legal Liability Detail Report

Features.  This report shows the specific URLs of legal liability Web activity by user, that is, visits to only the Anonymous/Public Proxy, Cults/Occults, Fantasy Sports, Gambling, Hate/Crime, Illegal Drugs, Malware, and Pornography categories that pose a legal liability risk.

Benefits.  The report provides only legal liability Web use. This means that smaller, more focused reports are available to facilitate analyses, investigations, and audits related to legal liability issues.


Search Terms Audit Detail Report

Features.  This report shows search terms that users entered on popular search sites such as Google. For each search term, it shows the IP address, user, date/time, and search engine.

Benefits.  This report indicates the number of search terms entered during the reporting period and can be used as a tool to aid in forensic investigations.


Site Audit Detail Report

Features.  This report focuses on Web activity associated with one or more Web sites. Every hit or visit made to the specified URLs is listed separately for all users. Hits or visits are listed chronologically, and information included for each hit or visit consists of the IP address, user, and full URL. The report also provides the time online percentage, total visits, and total time online for the top groups, users, and hourly activity.

Benefits.  Management has a complete yet concise view of all users that visited the specified Web sites and the resultant activity (hits or visits). This information can be used for personnel appraisal purposes, usage audits, etc.


User Audit Detail Report

Features.  This very detailed report focuses on a single user. Every visit made by the user is listed separately in chronological order. Information for each visit consists of the site's category and full URL. Each URL is hyperlinked so the site or page can be quickly accessed for review if desired. A summary total of visits, time online, and bytes read are also provided by category and hour activity.

Benefits.  Management has a concise but complete view of every URL the user has clicked. This information can be used for personnel appraisal purposes, incident investigations, usage audits, etc.


IT Reports

Network Information Report

Features.  This report depicts the total hits, trend in bytes, and total bytes by acceptability classification, category, group, IP address, and hourly activity. No individual users or sites are identified in this report.

Benefits.  This report is a powerful tool for network administrators. It serves as a valuable aid for managing and controlling bandwidth usage. By not showing users, it keeps the focus on bandwidth usage via hits, trend in bytes, and bytes, making it easier for administrators to quickly identify potential network performance problems.


Site Analysis Bandwidth Report

Features.  Similar in structure to the Site Analysis report, this report focuses on bandwidth consumption instead of visits. It breaks down bandwidth usage by acceptability classification, category, group, user, and user within each category, showing the trend in bytes and total bytes.

Benefits.  This report provides IT personnel with a comprehensive, categorized picture of how and when Web access is being used, and it does so while identifying the most active users in each category. This data is very helpful for managing bandwidth usage and advising management on corrective measures.


Top Bandwidth Sites Report

Features.  This report shows the top bandwidth-consuming site visits made by the selected group. Each site's category is shown with the byte consumption for the site. The list is sorted in descending order by bandwidth consumption, enabling quick determination of the category and domain affecting bandwidth. Individual users are not shown on this report. Hyperlinks to all visited Web sites are provided to facilitate further analysis.

Benefits.  This report quickly identifies the Web sites that consumed the most bandwidth in your network during the reporting period. If the consumption is unwarranted, you can use this information to prompt deeper investigation, or you can include the offending sites in your blocking regimen if you have one of our Web security products.


Forensic Reports

The reports in this group are audit detail reports that could be of interest to corporate IT forensic personnel, law enforcement agencies, anyone in the legal community, and forensic criminal investigators. These reports include Denied Requests Detail, Legal Liability Detail, Search Terms Audit Detail, and User Audit Detail which were described above.


Cloud Services Reports

The reports in this group show employee Web use of cloud services including the Web activity of your remote employees, i.e., cloud users, in a Hybrid deployment. Cloud service Web activity includes visits to sites in the Audio Streaming, Cloud Infrastructure, Cloud Storage, Collaboration, CRM, Development, File Sharing, HR, Personal E-Mail, Video Streaming, and VoIP Services categories. These reports include Cloud Services Detail and Cloud Services Summary which were described above.

© Copyright 1996-2024 Wavecrest Computing. All Rights Reserved.
Trial
Price Quote
"When I seek out a company to provide a product or service, I want it all -- a great product, a great price, a salesperson that is responsive and treats me like I am their only customer, and technical support that is intelligent, easy to access, and easy to understand. Wavecrest meets all of these criteria."

-Karleen Carlson, IT Manager, Van Diest Supply Company
Wavecrest Celebrating 25 years
Wavecrest Cyfin CyBlock Facebook Wavecrest Cyfin CyBlock Twitter Wavecrest Cyfin CyBlock Linkedin Wavecrest Cyfin CyBlock YouTube Wavecrest Cyfin CyBlock Knowledge Base
LEGAL PRIVACY | © Copyright 1996-2024 Wavecrest Computing. All Rights Reserved. | 321-953-5351